US7302584B2 - Mechanisms for banning computer programs from use - Google Patents
Mechanisms for banning computer programs from use Download PDFInfo
- Publication number
- US7302584B2 US7302584B2 US09/809,073 US80907301A US7302584B2 US 7302584 B2 US7302584 B2 US 7302584B2 US 80907301 A US80907301 A US 80907301A US 7302584 B2 US7302584 B2 US 7302584B2
- Authority
- US
- United States
- Prior art keywords
- banned
- computer
- program
- computer program
- virus
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
- 238000004590 computer program Methods 0.000 title claims abstract description 248
- 230000007246 mechanism Effects 0.000 title description 13
- 241000700605 Viruses Species 0.000 claims abstract description 84
- 230000002155 anti-virotic effect Effects 0.000 claims abstract description 43
- 230000009471 action Effects 0.000 claims abstract description 19
- 238000000034 method Methods 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 12
- 230000001960 triggered effect Effects 0.000 claims description 12
- 230000015654 memory Effects 0.000 claims description 8
- 230000003542 behavioural effect Effects 0.000 claims description 7
- 230000008520 organization Effects 0.000 abstract description 5
- 238000012545 processing Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 5
- 230000008901 benefit Effects 0.000 description 3
- 238000013459 approach Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
Definitions
- This invention relates to the field of data processing systems. More particularly, this invention relates to mechanisms for banning from use computer programs that may be executed on data processing systems.
- the anti-virus computer system provider would need to produce a wide set of banned computer program definition data such that individual users could pick the appropriate definition data to ban their particular set of unwanted computer programs. This would represent an impractical additional overhead on the anti computer virus system provider as a very large number of different banned program definition files would be required. Furthermore, it is undesirable for the anti-computer virus program provider to become involved in deciding which computer programs are potentially of a sort that a user may wish to ban.
- the present invention provides a computer program product comprising a computer program operable to control a computer to generate banned program identifying data indicative of one or more computer programs to be banned from use, said computer program comprising:
- the invention preserves the desirable characteristics of utilizing the anti-computer virus systems to enforce computer program banning whilst avoiding the disadvantages of requiring the system provider to produce many different banned computer program identifying data types by providing a tool to end users to themselves specify their own collection of computer programs that they wish to ban from their systems. This tool can then be used to generate banned program identifying data that interfaces with and controls an anti computer virus system to take banning measures against those computer programs specified as banned by a particular user.
- banned computer program identifying data can incorporate heuristic characteristics of banned computer programs such that new versions of those computer programs that are likely to show similar heuristic characteristics will also be likely to be identified as also being banned.
- the system may be utilized to produce banned computer program identifying data that effectively comprises a list of permitted computer programs with all computer not matching that list being treated as banned.
- the present invention provides a computer program product comprising a computer program operable to control a computer to ban from use one or more computer programs, said computer program comprising:
- the invention also provides a system responsive to that data for enforcing the banning of undesired computer programs.
- preferred embodiments may be arranged such that when the banned computer program identifying data is decrypted, it is stored within a secure memory region such that it is more resistant to malicious tampering.
- a banned computer program When a banned computer program is identified, various actions may be taken. One or more of the following actions may be desired: issuing an alert message to a user or network administrator indicating identification of a banned computer program, denying access to the banned computer program, encrypting the banned computer program to render it unusable and/or deleting the banned computer program.
- Preferred embodiments of the invention may also seek to protect themselves from being circumvented by a user deleting the banned computer program defining data by detecting the absence of this data and performing one or more of: issuing an alert message to the network administrator, restoring the missing data from a remote source or disabling the computer until the missing data is put back in place.
- the banned computer program enforcing mechanism can be implemented using the same instance of anti-virus computer software as is concurrently used for protecting the computer from computer virus threats.
- aspects of the invention also provide a method of generating banned program identifying data, a method of banning from use one or more computer programs, apparatus for generating banned program identifying data and apparatus for banning from use one or more computer programs.
- FIG. 1 schematically illustrates the relationship between an operating system and an anti-virus system
- FIG. 2 is a flow diagram illustrating the operation of the tool for generating banned computer program identifying data
- FIG. 3 is a flow diagram illustrating operation of the anti-virus computer system.
- FIG. 4 is a diagram schematically illustrating a general purpose computer for forming the above-described techniques.
- FIG. 1 illustrates an operating system 2 that co-operates with an anti-virus system 4 .
- file access requests are received by the operating system 2 as a result, for example, of application program use or user commands.
- a file access request is intercepted before it is serviced by the operating system and information characterizing the file access request is passed to the anti-virus software 4 .
- This information can include details such as the file name, the access requester, the location of the computer file requested, etc.
- the anti-virus software 4 uses this information to trigger an anti-virus engine 6 in conjunction with virus definition data 8 to perform an anti-virus scan of the computer file concerned. Such scans may be performed upon an on-access basis as described above or on an on-demand basis as part of regular thorough scan of an entire system. If the computer file in question passes the anti-virus scan, then a pass signal is returned to the operating system 2 which can then continue to service the file access request using, for example, a hard disk drive 10 storing the computer file.
- the anti-virus engine 6 is also responsive to banned computer program identifying data 12 .
- This banned computer program identifying data 12 can have essentially the same form as the virus definition data 8 and can be generated using techniques similar to those that are used to produce new virus definition data as new viruses are released into the wild. However, in this instance, the banned computer program identifying data is generated by an end user themselves rather than the anti-computer virus system provider.
- the tools required to identify a particular computer program as being a virus or banned are relatively straightforward and suitable for provision in a generic form as compared to the more complicated and problematic tools that are needed to produce programs to repair computer virus damage and the like.
- An advantage of using the anti-virus software 4 to identify banned computer programs is that these systems are set up to use identification mechanisms based upon fundamental characteristic of a computer program such that they may not be readily circumvented by merely renaming a computer program or changing insignificant portions of it. This makes anti-virus systems particularly well suited to enforcing the banning of certain computer programs.
- FIG. 2 is a flow diagram illustrating the creation of banned computer program identifying data.
- a user specifies the computer programs they wish to ban. The user may do this by collecting together within a certain directory key executable files or DLLs from an undesired computer program. It is usually readily apparent which are the key executable files and other files involved in a particular unwanted computer program. Alternatively, all the files associated with an undesired computer program could be banned.
- step 16 is performed to generate a set of banned computer program identifying data that may be utilized by the anti-virus software 4 .
- anti-virus software 4 as illustrated in FIG. 1 may be executed as a single instance of that software or alternatively multiple instances may be executed with one only being responsive to genuine virus definition data and the other being responsive to banned computer program identifying data.
- the banned computer program identifying data can look for key executable computer instruction sequences within the computer files concerned or alternatively/additionally identify heuristic behavioral characteristics of that computer program that may be analyzed in a manner that provides a degree of protection against variants of that computer program.
- the user may also associate specific actions to be triggered in response to identification of particular banned computer programs. These actions may include issuing an alert message to the user or the system administrator, denying access to the banned computer program in a manner similar to the way access is denied to a computer virus, encrypting the banned computer program rendering it unusable or possibly deleting the banned computer program. These responses may be set as a policy that is applied to all banned computer programs or alternatively may be individually tailored to each banned computer program.
- the banned computer program identifying data is encrypted using the private PGP key of the organization generating it at step 18 . Encrypting the data in this way has the result that only a computer using the corresponding public key will successfully decrypt it so rendering the widespread distribution of malicious banned computer program identifying data file less likely.
- the banned computer program identifying data file may be distributed to all of the target computers using the mechanisms that are normally employed to distribute virus definition data.
- FIG. 3 is a flow diagram illustrating operation of the anti-virus software.
- the anti-virus software is started. This will typically take place at boot-up in a system that is permanently running anti-virus software.
- the banned computer program identifying data file is decrypted using the public PGP key stored within the computer in question.
- the decrypted file is authenticated.
- the decrypted data file is not successfully authenticated, then it will not be used.
- various mechanisms may be triggered in order to resist a user trying to circumvent the banning mechanisms. These triggered mechanisms include issuing an alert message to the system administrator, automatically restoring the missing data file from a remote source or possibly disabling the computer concerned until the missing file is put in place. The options to carry out these tasks can be set up by the system administrator at the time that the anti-virus system is installed and do not all need to be used.
- the properly authenticated banned computer program identifying data is stored within a secure memory area.
- the anti-virus system waits until a file access request for scanning is received from the operating system 2 .
- step 32 When a file access request is received, step 32 performs a normal anti-virus scan using the virus definition data 8 . If the virus scan is not passed as is detected by step 34 , then standard anti-virus action is triggered at step 36 and a fail response is returned to the operating system at step 38 .
- step 40 a scan for banned computer programs is performed. This uses the banned computer program identifying data 12 and the standard anti-virus engine 6 . If a banned computer program is detected at step 42 , then banned actions 44 , such as described above, are triggered and a fail response is returned to the operating system 2 at step 46 .
- a pass response is returned to the operating system 2 by step 48 .
- FIG. 2 An alternative approach suitable for high security environments is one in which the user specifies a list of permitted computer programs with all other computer programs being treated as banned.
- the process illustrated in FIG. 2 may then be modified to produce data identifying all permitted computer files.
- the FIG. 3 system is then modified to check for permitted files rather than banned files. If a computer file is not positively identified as a permitted file, then it is treated as banned with a fail response being returned to the operating system when it is scanned to see if it belongs to the permitted list of files.
- FIG. 3 shows the anti-virus scan taking place before the banned scan, but it will be appreciated these could be performed in the other order.
- FIG. 4 schematically illustrates a computer 200 of a type that may be used to execute the computer programs described above.
- the computer 200 includes a central processing unit 202 , a random access memory 204 , a read-only memory 206 , a hard disk drive 208 , a display driver 210 and display 212 , a user input/output circuit 214 , a keyboard 216 , a mouse 218 and a network interface circuit 220 , all coupled via a common bus 222 .
- the central processing unit 202 executes computer programs using the random access memory 204 as its working memory.
- the computer programs may be stored within the read-only memory 206 , the hard disk drive 208 or retrieved via the network interface circuit 220 from a remote source.
- the computer 200 displays the results of its processing activity to the user via the display driver 210 and the display 212 .
- the computer 200 receives control inputs from the user via the user input/output circuit 214 , the keyboard 216 and the mouse 218
- the computer program product described above may take the form of a computer program stored within the computer system 200 on the hard disk drive 208 , within the random access memory 204 , within the read-only memory 206 , or downloaded via the network interface circuit 220 .
- the computer program product may also take the form of a recording medium such as a compact disk or floppy disk drive that may be used for distribution purposes.
- the various components of the computer 200 serve to provide the appropriate circuits and logic for carrying out the above described functions and acts.
- the computer 200 illustrated in FIG. 4 is merely one example of a type of computer that may execute the computer program product, method and provide the apparatus described above.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (34)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/809,073 US7302584B2 (en) | 2001-03-16 | 2001-03-16 | Mechanisms for banning computer programs from use |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/809,073 US7302584B2 (en) | 2001-03-16 | 2001-03-16 | Mechanisms for banning computer programs from use |
Publications (2)
Publication Number | Publication Date |
---|---|
US20020133710A1 US20020133710A1 (en) | 2002-09-19 |
US7302584B2 true US7302584B2 (en) | 2007-11-27 |
Family
ID=25200478
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/809,073 Expired - Fee Related US7302584B2 (en) | 2001-03-16 | 2001-03-16 | Mechanisms for banning computer programs from use |
Country Status (1)
Country | Link |
---|---|
US (1) | US7302584B2 (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060230291A1 (en) * | 2005-04-12 | 2006-10-12 | Michael Burtscher | System and method for directly accessing data from a data storage medium |
US8239668B1 (en) | 2009-04-15 | 2012-08-07 | Trend Micro Incorporated | Computer security threat data collection and aggregation with user privacy protection |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9117069B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9754102B2 (en) | 2006-08-07 | 2017-09-05 | Webroot Inc. | Malware management through kernel detection during a boot sequence |
US20190036965A1 (en) * | 2017-07-27 | 2019-01-31 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
US11412005B2 (en) * | 2019-08-29 | 2022-08-09 | Juniper Networks, Inc. | Lawfully intercepting traffic for analysis based on an application identifier or a uniform resource locator (URL) associated with the traffic |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2003044297A (en) * | 2000-11-20 | 2003-02-14 | Humming Heads Inc | Information processing method and device controlling computer resource, information processing system, control method therefor, storage medium and program |
US7000250B1 (en) * | 2001-07-26 | 2006-02-14 | Mcafee, Inc. | Virtual opened share mode system with virus protection |
US8984636B2 (en) | 2005-07-29 | 2015-03-17 | Bit9, Inc. | Content extractor and analysis system |
US8272058B2 (en) | 2005-07-29 | 2012-09-18 | Bit 9, Inc. | Centralized timed analysis in a network security system |
US7895651B2 (en) | 2005-07-29 | 2011-02-22 | Bit 9, Inc. | Content tracking in a network security system |
US20090165132A1 (en) * | 2007-12-21 | 2009-06-25 | Fiberlink Communications Corporation | System and method for security agent monitoring and protection |
US8650648B2 (en) | 2008-03-26 | 2014-02-11 | Sophos Limited | Method and system for detecting restricted content associated with retrieved content |
US9021545B2 (en) * | 2010-08-31 | 2015-04-28 | Hewlett-Packard Development Company, L.P. | Method and system to secure a computing device |
US8595353B2 (en) | 2011-06-06 | 2013-11-26 | International Business Machines Corporation | Automated recommendations for cloud-computing options |
US9210098B2 (en) | 2012-02-13 | 2015-12-08 | International Business Machines Corporation | Enhanced command selection in a networked computing environment |
US8838799B2 (en) | 2012-02-13 | 2014-09-16 | International Business Machines Corporation | Command management in a networked computing environment |
Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4757534A (en) * | 1984-12-18 | 1988-07-12 | International Business Machines Corporation | Code protection using cryptography |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5452442A (en) * | 1993-01-19 | 1995-09-19 | International Business Machines Corporation | Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities |
US5844986A (en) * | 1996-09-30 | 1998-12-01 | Intel Corporation | Secure BIOS |
US5854916A (en) * | 1995-09-28 | 1998-12-29 | Symantec Corporation | State-based cache for antivirus software |
US5859968A (en) * | 1996-03-29 | 1999-01-12 | Ada G. Berg | Data security device for controlling access to external data drives |
US6052531A (en) * | 1998-03-25 | 2000-04-18 | Symantec Corporation | Multi-tiered incremental software updating |
US6216112B1 (en) * | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US20010020245A1 (en) * | 2000-02-16 | 2001-09-06 | Microsoft Corporation | Method and system for deterministic ordering of software modules |
US6292012B1 (en) * | 1999-10-06 | 2001-09-18 | Winbond Electronics Corp. | Device for protecting a programmable non-volatile memory |
US20020116627A1 (en) * | 2001-02-20 | 2002-08-22 | Tarbotton Lee Codel Lawson | Software audit system |
US6577920B1 (en) * | 1998-10-02 | 2003-06-10 | Data Fellows Oyj | Computer virus screening |
WO2003101037A1 (en) * | 2002-05-23 | 2003-12-04 | Symantec Corporation | Metamorphic computer virus detection |
US6694434B1 (en) * | 1998-12-23 | 2004-02-17 | Entrust Technologies Limited | Method and apparatus for controlling program execution and program distribution |
US20040255144A1 (en) * | 2002-12-13 | 2004-12-16 | Christophe Le-Rouzo | Methods and apparatus relating to class issues, product detection and customer support |
US20060053202A1 (en) * | 2004-09-09 | 2006-03-09 | Chris Foo | Method and system implementing secure email |
-
2001
- 2001-03-16 US US09/809,073 patent/US7302584B2/en not_active Expired - Fee Related
Patent Citations (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4757534A (en) * | 1984-12-18 | 1988-07-12 | International Business Machines Corporation | Code protection using cryptography |
US5440723A (en) * | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks |
US5452442A (en) * | 1993-01-19 | 1995-09-19 | International Business Machines Corporation | Methods and apparatus for evaluating and extracting signatures of computer viruses and other undesirable software entities |
US5854916A (en) * | 1995-09-28 | 1998-12-29 | Symantec Corporation | State-based cache for antivirus software |
US5859968A (en) * | 1996-03-29 | 1999-01-12 | Ada G. Berg | Data security device for controlling access to external data drives |
US5844986A (en) * | 1996-09-30 | 1998-12-01 | Intel Corporation | Secure BIOS |
US6052531A (en) * | 1998-03-25 | 2000-04-18 | Symantec Corporation | Multi-tiered incremental software updating |
US6216112B1 (en) * | 1998-05-27 | 2001-04-10 | William H. Fuller | Method for software distribution and compensation with replenishable advertisements |
US6577920B1 (en) * | 1998-10-02 | 2003-06-10 | Data Fellows Oyj | Computer virus screening |
US6694434B1 (en) * | 1998-12-23 | 2004-02-17 | Entrust Technologies Limited | Method and apparatus for controlling program execution and program distribution |
US6292012B1 (en) * | 1999-10-06 | 2001-09-18 | Winbond Electronics Corp. | Device for protecting a programmable non-volatile memory |
US20010020245A1 (en) * | 2000-02-16 | 2001-09-06 | Microsoft Corporation | Method and system for deterministic ordering of software modules |
US20020116627A1 (en) * | 2001-02-20 | 2002-08-22 | Tarbotton Lee Codel Lawson | Software audit system |
WO2003101037A1 (en) * | 2002-05-23 | 2003-12-04 | Symantec Corporation | Metamorphic computer virus detection |
US20040255144A1 (en) * | 2002-12-13 | 2004-12-16 | Christophe Le-Rouzo | Methods and apparatus relating to class issues, product detection and customer support |
US20060053202A1 (en) * | 2004-09-09 | 2006-03-09 | Chris Foo | Method and system implementing secure email |
Non-Patent Citations (10)
Title |
---|
Bailey, Darragh. "Re: Creating own Virus Signatures", May 2004, <http://citadelle.intrinsec.com/mailing/current/HTML/ml<SUB>-</SUB>focus<SUB>-</SUB>virus/2672.html>. * |
Hedberg, Sara. "Combating computer viruses: IBM's new computer immune system", 1996. * |
Lavasoft. "Ad-aware", Feb. 2001, <http://web.archive.org/web/20010207040025/http://www.lavasoft.de/aaw/aaw1.html>. * |
Network Associates, Inc. "How PGP Works", <http://www.pgpi.org/doc/pgpintro/>. * |
Simpson, Sarah. "Cryptography in Everyday Life", 1997, <http://www.eco.utexas.edu/faculty/Norman/BUS.FOR/course.mat/SSim/life.html>. * |
Symantec Corporation. "Norton AntiVirus User's Guide", 2000. * |
Symantec Corporation. "Norton Internet Security User's Guide", 1999. * |
Szor, Peter. "Bad IDEA", Apr. 1998, Virus Bulletin, pp. 18-19. * |
Veldman, Frans. "Heuristic Anti-Virus Technology", 1994, <http://www.madchat.org/vxdevl/papers/avers/heuris.txt>. * |
Wobensmith, Matt. "Why does NAV indicate a virus alert with the Flash Player?", Feb. 2000, <http://web.archive.org/web/20000229121614/http://www.macromedia.com/support/flash/ts/documents/pwsteal.htm>. * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9350752B2 (en) | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9118710B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US10154055B2 (en) | 2003-07-01 | 2018-12-11 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US10104110B2 (en) | 2003-07-01 | 2018-10-16 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118709B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9117069B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Real-time vulnerability monitoring |
US9118708B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US10050988B2 (en) | 2003-07-01 | 2018-08-14 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US9118711B2 (en) | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9225686B2 (en) | 2003-07-01 | 2015-12-29 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US10021124B2 (en) | 2003-07-01 | 2018-07-10 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US7565695B2 (en) * | 2005-04-12 | 2009-07-21 | Webroot Software, Inc. | System and method for directly accessing data from a data storage medium |
US20060230291A1 (en) * | 2005-04-12 | 2006-10-12 | Michael Burtscher | System and method for directly accessing data from a data storage medium |
US9754102B2 (en) | 2006-08-07 | 2017-09-05 | Webroot Inc. | Malware management through kernel detection during a boot sequence |
US9043587B1 (en) | 2009-04-15 | 2015-05-26 | Trend Micro Incorporated | Computer security threat data collection and aggregation with user privacy protection |
US8239668B1 (en) | 2009-04-15 | 2012-08-07 | Trend Micro Incorporated | Computer security threat data collection and aggregation with user privacy protection |
US11489857B2 (en) | 2009-04-21 | 2022-11-01 | Webroot Inc. | System and method for developing a risk profile for an internet resource |
US20220141250A1 (en) * | 2017-07-27 | 2022-05-05 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
US11153343B2 (en) * | 2017-07-27 | 2021-10-19 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
US10594725B2 (en) * | 2017-07-27 | 2020-03-17 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
US20190036965A1 (en) * | 2017-07-27 | 2019-01-31 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
US12095810B2 (en) * | 2017-07-27 | 2024-09-17 | Cypress Semiconductor Corporation | Generating and analyzing network profile data |
US11412005B2 (en) * | 2019-08-29 | 2022-08-09 | Juniper Networks, Inc. | Lawfully intercepting traffic for analysis based on an application identifier or a uniform resource locator (URL) associated with the traffic |
Also Published As
Publication number | Publication date |
---|---|
US20020133710A1 (en) | 2002-09-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7302584B2 (en) | Mechanisms for banning computer programs from use | |
US20220284094A1 (en) | Methods and apparatus for malware threat research | |
US7281267B2 (en) | Software audit system | |
JP6522707B2 (en) | Method and apparatus for coping with malware | |
US7765406B2 (en) | System, computer program and method for a crytographic system using volatile allocation of a superkey | |
US7660797B2 (en) | Scanning data in an access restricted file for malware | |
US9348984B2 (en) | Method and system for protecting confidential information | |
JP6370747B2 (en) | System and method for virtual machine monitor based anti-malware security | |
US20110087899A1 (en) | Firewall plus storage apparatus, method and system | |
US9118617B1 (en) | Methods and apparatus for adapting the protection level for protected content | |
JP2012146317A (en) | Network security system and method | |
US7093135B1 (en) | Software virus detection methods and apparatus | |
US8060867B2 (en) | Systems and methods for excluding user specified applications | |
Lemmou et al. | A behavioural in‐depth analysis of ransomware infection | |
JP6254414B2 (en) | Information processing apparatus, information processing system, and information processing method | |
US20110252468A1 (en) | Method and system for protecting a computer againts malicious software | |
Alzahrani et al. | An overview of ransomware in the windows platform | |
JP2014096143A (en) | Information processing device, information processing system and information processing method | |
WO2025015325A1 (en) | Context-based countermeasures for cybersecurity threats | |
Chang et al. | The design and implementation of tamper resistance for mobile game service | |
Rabaiotti | Counter Intrusion Software | |
Dresner et al. | Project Work (2013/2014) Progress Report for Whitelisting software | |
Turaev | Literature Review on Ransomware and Approaches to Its Mitigation | |
Bridges | Studying a virtual testbed for unverified data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: NETWORKS ASSOCIATES TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:TARBOTTON, LEE C. L.;RICE, TREVOR H.;ROBERTS, GUY W. W.;AND OTHERS;REEL/FRAME:011623/0940;SIGNING DATES FROM 20010213 TO 20010308 |
|
AS | Assignment |
Owner name: MCAFEE, INC.,CALIFORNIA Free format text: MERGER;ASSIGNOR:NETWORKS ASSOCIATES TECHNOLOGY, INC.;REEL/FRAME:016593/0812 Effective date: 20041119 Owner name: MCAFEE, INC., CALIFORNIA Free format text: MERGER;ASSIGNOR:NETWORKS ASSOCIATES TECHNOLOGY, INC.;REEL/FRAME:016593/0812 Effective date: 20041119 |
|
CC | Certificate of correction | ||
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20151127 |